Books > Social sciences > Warfare & defence > Theory of warfare & military science
|
Buy Now
Reconstructing Japan's Security - The Role of Military Crises (Hardcover)
Loot Price: R2,329
Discovery Miles 23 290
|
|
Reconstructing Japan's Security - The Role of Military Crises (Hardcover)
Expected to ship within 12 - 17 working days
|
Systematically analyses the impact of external military crises on
Japanese security policy expansion in the post-Cold War period.
Focuses on the widening of Japan's security posture in external
security affairs and investigates the causes of this critical
change Identifies the external military crisis as a critical
determinant of change in Japanese security policy Unpacks the deep
structures within the Japanese decision-making processes,
especially during and after military crises Examines five key
military crises in detail: the 1990-1 Persian Gulf War; the 1994
North Korean Nuclear Crisis; the 1996 Taiwan Straits Crisis, the
1998 Taepodong Crisis; and 2001 September 11 attacks that led to
the US-led war against terrorism in Afghanistan and Iraq Draws on
over 70 interviews the author has conducted with officials, former
officials, and academics in universities and think tanks in Japan,
the United States, South Korea and Singapore, including officials
who were directly involved in the crisis decision-making process
This book is a detailed study of the role that external military
crises played in the development and growth of Japanese security
policies in the period following the end of the Cold War. This
evolution can be seen in the widened role of the Self-Defence Force
(SDF) in shaping Japan's security priorities, as well as its
proactive contribution to regional/ international security.
Focusing on four key case studies - international peacekeeping in
1992, regional defence in 1997-99, global missions in 2003-05, and
collective self-defence in 2014-15 - the author argues that the
Japanese security policymaking elite achieved security policy
expansion by utilizing external military crises as policy windows,
inflating and deflating threat elements to circumvent the
constraints and justify the implementation of security policy
initiatives.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
You might also like..
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.